<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Think of DNS tunneling like stuffing secret notes inside the envelopes of routine mail. The post office sees only envelopes, so the notes slip through. Consumer VPN and “free net” apps use the same trick with DNS queries and responses to bypass filters. On a protected network, that stunt shows up as odd, repetitive lookups to a single domain or clusters of subdomains that were never meant for everyday browsing.</p> <!--more--><p>Below, we present an analysis of several domains and applications that depend on, or are closely linked to, DNS tunneling or related covert transport mechanisms. We'll then cover how the&nbsp; ThreatSTOP Protective DNS protection effectively intercepts this traffic before it poses a risk. I intentionally omitted discussing all the applications we monitor and control, so I’ve selected the five that caught my attention this morning.</p> <h3><strong>What we observed</strong></h3> <h4><strong>AM TUNNEL PLUS and </strong><strong>ammoplus[.]xyz</strong></h4> <p><strong><img src="https://2548414.fs1.hubspotusercontent-na1.net/hubfs/2548414/Screenshot%202025-09-09%20at%2010.58.27.png" width="673" height="573" loading="lazy" alt="Screenshot 2025-09-09 at 10.58.27" style="height: auto; max-width: 100%; width: 673px;"></strong></p> <h4>&nbsp;</h4> <ul> <li> <p><span><strong>App</strong></span>: AM TUNNEL PLUS, attributed to the APNA TUNNEL group.</p> </li> <li> <p><span><strong>Status</strong></span>: Unpublished from Google Play on January 10, 2025. Third-party stores still distribute it, and we see traffic active as of this morning: 2025-09-09</p> <ul> <li><img src="https://2548414.fs1.hubspotusercontent-na1.net/hubfs/2548414/Screenshot%202025-09-09%20at%2010.59.32.png" width="673" height="416" loading="lazy" alt="Screenshot 2025-09-09 at 10.59.32" style="height: auto; max-width: 100%; width: 673px;"></li> </ul> </li> <li> <p><span><strong>Evidence of linkage</strong></span>: The app’s privacy policy URL points to <span>https://ammoplus[.]xyz/user/privacy_pub</span>, which ties the app to the domain.</p> </li> <li> <p><span><strong>Infra notes</strong></span>: The domain is used for app infrastructure, not a normal website.</p> <ul> <li> <p>Observed subdomain example: <span>sd-udp534.ammoplus[.]xyz</span>.</p> </li> </ul> </li> <li> <p><span><strong>DNS tunneling</strong></span>: <a href="https://pts-project.org/blog/analysis-of-apna-tunnel-lite-v27/" rel="noopener" target="_blank">The app family is part of the “tunneling” ecosystem. Open source and community artifacts around sibling apps show custom subdomains and unusual transport setups consistent with tunneling</a>.&nbsp;</p> <ul> <li>What a query looks like: <ul> <li><code>7olyey2haootjy5m5miezrfenlrvcacaacjs6aaafuaaaaa4aaaaanaaaaacfjv.</code></li> <li><code>jbjnfvyzfcimkl2mr3ycs6e6osoqx2ty7bh5eojsboqpcxcldvaxjyhjvjie3cz.</code></li> <li><code>ka5peoqnt7oyq4h3q.sd-udp534.ammoplus[.]xyz</code></li> </ul> </li> </ul> </li> </ul> <h4>&nbsp;</h4> <h4><strong>Zedtunnel VPN and </strong><strong>zedtunnel[.]com</strong></h4> <p><strong><img src="https://2548414.fs1.hubspotusercontent-na1.net/hubfs/2548414/Screenshot%202025-09-09%20at%2011.01.48.png" width="673" height="985" loading="lazy" alt="Screenshot 2025-09-09 at 11.01.48" style="height: auto; max-width: 100%; width: 673px;"></strong></p> <ul> <li> <p><span><strong>App</strong></span>: Zedtunnel VPN, positioned as “Unlimited Free SSH and SlowDNS VPN.”</p> </li> <li> <p><span><strong>DNS tunneling</strong></span>: Strong. The app advertises a DNS mode and references SlowDNS or DNSTT. Community reports describe “<a href="https://www.nairaland.com/7706376/unlimited-internet" rel="noopener" target="_blank">free browsing</a>” by selecting DNS-based presets. &nbsp;Easily able to bypass your corporate security controls.</p> </li> <li> <p><span><strong>Infra notes</strong></span>: Domain used as a rendezvous for tunnel traffic, often with queries to subdomains carrying encoded payloads. <a href="https://ipinfo.io/ips/91.231.182.0/24" rel="noopener" target="_blank">Historical DNS places it on a VPS</a>.&nbsp;</p> </li> </ul> <p>Let's pause and chat about this "SlowDNS" term:</p> <h5><strong>DNS Tunneling Functionality (“SlowDNS”)</strong></h5> <p>Zedtunnel VPN implements a DNS tunnel protocol referred to as <i>“Slow DNS”</i> or <span><strong>DNSTT</strong></span>. (In community slang, “SlowDNS” has become a generic term for <a href="https://computerscot.github.io/dnstt.html" rel="noopener">DNS-based free internet tricks</a>, highlighting that it’s usually much slower than normal internet) DNSTT stands for “DNS Tunnel Turbo” – an open-source protocol that carries data in DNS <span style="font-weight: normal;">TXT records</span> and can also leverage DNS over HTTPS/TLS for stealth <span></span>. Zedtunnel’s inclusion of a “Slow DNSTT protocol” mode indicates that when a user activates this mode, the app will perform DNS lookups for subdomains of <span style="font-weight: normal;">zedtunnel[.]com (or related domains controlled by the service) that encode the user’s </span>traffic. On the server side, an authoritative DNS server for <i>zedtunnel[.]com</i> (running a tunneling daemon) answers those queries with crafted DNS responses that carry the tunneled data. This effectively creates a VPN-like link over DNS.</p> <p><span style="font-weight: normal;">How zedtunnel[.]com is used in DNS tunneling:</span> Typically, the app will have configured <i>zedtunnel[.]com</i> (or a subdomain) as the tunnel domain. For example, it might query something like "<code>wlk7krraa6lqd2g2pdy5tttavr4q.sgt1.zedtunnel[.]com</code>". &nbsp;The queries are routed by the device’s resolver (often the ISP’s DNS server) up to the authoritative nameserver for zedtunnel[.]com. Using DNSTT, the payload is placed in DNS records (commonly TXT records, for example:</p> <p><code>\000\026\015 /XQ\000@\000-fKY&lt;\000\000\000M\000\000\000\002\000\000\000\000\024\0000\015 </code></p> <p><code>/XQ\000@\000-fKY=\000\000\000M\000\000\000\024\000\000\000\198;\232\222\132G\020J\145\142</code></p> <p><code>\003\165Z\230\001\150\231hv\183E\194\192\025\000J\015 /XQ\000@\000\140mKY&lt;\000\000\000M</code></p> <p><code>\000\000\000\002\000\000\000\000\024\015 /XQ\000@\000\140mKY=\000\000\000M\000\000\000</code></p> <p><code>\024\000\000\000\198;\232\222\132G\020J\145\142\003\165Z\230\001\150\231hv\183E\194\192</code></p> <p><code>\025\000J\015 /XQ\000@\000J|KY&lt;\000\000\000M\000\000\000\002\000\000\000\000\024\015 </code></p> <p><code>/XQ\000@\000J|KY=\000\000\000M\000\000\000\024\000\000\000\198;\232\222\132G\020J\145</code></p> <p><code>\142\003\165Z\230\001\150\231hv\183E\194\192\025\000\026\015 /XQ\000@\000=\141KY&gt;</code></p> <p><code>\000\000\000M\000\000\000\002\000\000</code></p> <p>... Rather than standard A record lookups. DNS tunnels have high overhead and latency, hence the moniker “SlowDNS.” Users on forums have acknowledged this is primarily useful for basic connectivity when you have no data plan.&nbsp;</p> <p>From a <i>technical evidence</i> standpoint, if one monitors network traffic on a device using Zedtunnel’s DNS mode, they would observe a flurry of DNS queries to <span style="font-weight: normal;">zedtunnel[.]com</span> (or its subdomains), often with very long or unusual-looking subdomain strings (these carry the encoded data).&nbsp;</p> <h3><strong>ployvpn[.]uk </strong><strong>and </strong><strong>slow-ss5.ployvpn[.]uk</strong></h3> <ul> <li> <p><span><strong>Distribution</strong></span>: The ployvpn[.]uk DNS tunnel is utilized via custom tunneling apps rather than a standalone product.</p> <ul> <li> <p>The domain <i>ployvpn[.]uk</i> appears tied to a community-run mobile VPN/tunneling service (again, Android-focused). It is referenced in free “Slow DNS” configurations shared on <a href="https://t.me/s/VPSXMKOCOM" rel="noopener" target="_blank">Telegram</a>, particularly in Southeast Asian free-internet communities.&nbsp;<span></span></p> </li> </ul> </li> <li> <p><span><strong>DNS tunneling</strong></span>:</p> <ul> <li> <p>The Telegram leak provides strong evidence that ployvpn[.]uk’s service uses DNS tunneling. The config explicitly labels <span><strong>“</strong><span style="font-weight: normal;">Slow DNS</span><strong>”</strong></span> parameters and even provides a<span style="font-weight: normal;"> DNS Public Key</span> (a 64-hex string).</p> </li> <li>What a query looks like: <ul> <li><code>3evvzyzqjvqazyyasj7ieyd6doifcacaaa3liaaa7mbaaaghaaaaa2qaaaakbtl.</code></li> <li><code>yivqy7mzxxllsdh3nt6sr4y4yii7nnculkmpfb6hqkxdaijte537zca2s33wwim.</code></li> <li><code>y7qgd5niwndg7ysxonwpgd2pnanu4nq2npw7yo2yk3yytztonebcactymgvcogf.</code></li> <li><code>lgcjkzz36ckqdudt5wtdrdvztsizonphyns2a53g.slow-ss5.ployvpn[.]uk</code></li> </ul> </li> </ul> </li> </ul> <h3><strong>sergan[.]xyz </strong><strong>and </strong><strong>b.sergan[.]xyz</strong></h3> <ul> <li> <p><span><strong>Distribution</strong></span>: Sergan[.]xyz appears to be another domain used in the DNS-tunneling VPN ecosystem, though it is more obscure. We did not find an official VPN product named “Sergan,” indicating this is likely an infrastructure domain rather than a consumer-facing brand. Its use has been noted in contexts similar to ployvpn[.]uk – i.e. configuration files or account credentials for SSH-over-DNS services. Given the naming and TLD, sergan[.]xyz is likely run by an individual or small group (XYZ domains are low-cost).</p> </li> <li> <p><span><strong>DNS tunneling</strong></span>:&nbsp;</p> <ul> <li>What a query looks like: <ul> <li><code>gzjsoxeeznw65y2kxqueqztvd6sfcabaaaqqkaaaaeaaaaaaaaaaamaaaaacq2o.</code></li> <li><code>h6w5hpehoaepr7u42k45hcj45liniczl2sotulmozn7hm4heodmwlojj4npbc4l.</code></li> <li><code>2hvyjysmi6.b.sergan[.]xyz</code></li> </ul> </li> </ul> </li> </ul> <h3><strong>xyclops[.]cloud </strong><strong>and </strong><strong>fns2.xyclops[.]cloud</strong></h3> <ul> <li> <p><span><strong>Distribution</strong></span>: Shared “SSH SlowDNS account” posts list <span>fns2.xyclops[.]cloud:53</span> with a public key, a direct indicator of DNSTT-style DNS tunneling.</p> <ul> <li>&nbsp;We found a concrete reference in a <a href="https://t.me/DecryptTLS" rel="noopener" target="_blank">Telegram channel</a> that shared an “SSH SLOW DNS ACCOUNT” using xyclops[.]cloud. The snippet shows credentials with a server address fns2.xyclops[.]cloud:53 and an accompanying Name-Server set to fns2.xyclops[.]cloud, plus a Public Key.</li> <li> <p>Xyclops[.]cloud’s operation aligns with SlowDNS/DNSTT techniques. The account shared (<span>jfree:828382</span> in the example) is an SSH login, meaning once the DNS tunnel is established, the user can SSH to the server (often 127.0.0.1 at some forwarded port) to actually proxy traffic. The DNS patterns here would involve the client encoding SSH payloads into a series of DNS queries to <i>fns2.xyclops[.]cloud</i>, which is likely authoritative for the xyclops[.]cloud domain.</p> </li> </ul> </li> <li> <p><span><strong>DNS tunneling</strong></span>:&nbsp;</p> <ul> <li>What a query looks like: <ul> <li><code>c5i7orsthxtvry63p5jeqpjdqkcvcaaaaqbaaaaaaeaaaaaaaaaaamaaaaadwxl.</code></li> <li><code>viqpch6flamf37isn74bqyomalyfvfrzn2hpecica45nxkpgjn7q3zfrqoswdvx.</code></li> <li><code>i7hdxxg7hg.fns2.xyclops[.]cloud</code></li> </ul> </li> </ul> </li> </ul> <h3><strong>Pingle VPN and </strong><strong>pingle[.]one</strong></h3> <ul> <li> <p><span><strong>App</strong></span>: &nbsp;In contrast to the above, pingle[.]one is the domain of a legitimate commercial VPN service called Pingle VPN. Pingle is an emerging VPN provider focusing on censorship-heavy markets (Russia, China, Turkmenistan, etc.), and it offers apps for multiple platforms (Android, iOS, Windows, etc.). The service is professionally developed – the website touts modern proxy protocols and even Web3 integrations (they provide an IPFS link and an Ethereum Name Service domain to reach their site if the main domain is blocked). Pingle’s inclusion in this list is interesting, as it’s not an underground free-tunnel like the others; however, Pingle explicitly markets itself as working in the “strictest internet censorship” environments. This implies Pingle has to use creative techniques to connect – possibly including DNS-based tunneling as a fallback.</p> </li> <li> <p><span><strong>Transport</strong></span>: Focus on TLS obfuscation, Cloudflare CDN usage, and alternate reachability methods.</p> </li> <li> <p><span><strong>DNS tunneling</strong></span>:&nbsp;</p> <ul> <li>What a query looks like: <ul> <li><code>usuxegfmy5jgtyyq247bvpm2u22vcaaaafiqaaaaaaaaaaaaaaaaaaqaaaaaama.</code></li> <li><code>t.pingle[.]one</code></li> </ul> </li> </ul> </li> </ul> <h3><strong>Why this matters to defenders</strong></h3> <p>DNS tunneling gives endpoints a covert path off your network. Even if the intent is simply to bypass a captive portal, the effect is the same as a policy violation. Repeated, high-entropy queries to a single uncommon domain or many long subdomain labels are hallmark signs. On corporate networks, this traffic can undermine monitoring and allow unapproved data extraction.</p> <h3><strong>How ThreatSTOP stops it</strong></h3> <p><strong>Protective DNS</strong></p> <ul> <li> <p><span><strong>DNS Defense Cloud</strong></span> and <span><strong>DNS Defense</strong></span> apply thousands of ThreatSTOP Security, Intelligence, and Research team protections in real time.</p> </li> <li> <p>We maintain protections against DNS Tunnels, as well as command and control, data exfiltration, proxy and anonymizer infrastructure&nbsp;phishing, SPAM, peer-to-peer abuse, invalid traffic, and DDoS staging.</p> </li> <li> <p>When domains like the ones above are classified as tunneling infrastructure or high risk, Protective DNS blocks lookups at the resolver. That prevents the tunnel from establishing because the client never reaches the authoritative DNS under the attacker or operator’s control.</p> </li> <li> <p>Our protections update continuously so newly observed tunnel endpoints and subdomains can be interdicted quickly.</p> </li> </ul> <p><strong>Operational outcomes</strong></p> <ul> <li> <p>Stop unauthorized VPNs and shadow IT tunnels at the first packet that matters.</p> </li> <li> <p>Reduce exfiltration risk by denying covert channels.</p> </li> <li> <p>Improve incident response with clear indicators.&nbsp;</p> </li> </ul> <h3><strong>Practical guidance for your team</strong></h3> <ul> <li> <p><span><strong>Monitor for patterns</strong></span>: Sudden spikes of DNS queries to a single domain, very long subdomain labels, repetitive TXT lookups, and persistent queries at short intervals.</p> </li> <li> <p><span><strong>Block by policy</strong></span>: Treat DNS tunneling apps as unapproved network proxies. If your acceptable use policy forbids them, enforce with Protective DNS and IP Defense.</p> </li> <li> <p><span><strong>Triage quickly</strong></span>: Identify the host using the tunnel, remove the app, and validate that no sensitive data left the environment.</p> </li> <li> <p><strong>Hunt IOCs</strong><span>:</span></p> <ul> <li> <p>ammoplus[.]xyz</p> </li> <li> <p>zedtunnel[.]com</p> </li> <li> <p>ployvpn[.]uk</p> </li> <li> <p>sergan[.]xyz</p> </li> <li> <p>xyclops[.]cloud</p> </li> <li>pingle[.]one</li> </ul> <p>&nbsp;</p> </li> </ul> <h3><strong>Move the needle</strong></h3> <p>For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our <a href="/threatstop-platform" rel="noopener" target="_blank">product page</a>. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers. Get started with <a href="https://admin.threatstop.com/register?hsLang=en" rel="noopener" target="_blank">a Demo today</a>.</p> <p><strong>Connect with Customers, Disconnect from Risks</strong></p> <p>&nbsp;</p> <h3><strong>MITRE ATT&amp;CK mapping for DNS tunneling and related covert transports</strong></h3> <p>&nbsp;</p> <table style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2;"> <thead> <tr> <th> <p><strong>ATT&amp;CK Tactic</strong></p> </th> <th> <p><strong>Technique</strong></p> </th> <th> <p><strong>Why it applies in this context</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Command and Control</p> </td> <td> <p>Application Layer Protocol: DNS (T1071.004)</p> </td> <td> <p>DNS queries and responses are used as the C2 and data channel in SlowDNS and DNSTT modes.</p> </td> </tr> <tr> <td> <p>Command and Control</p> </td> <td> <p>Encrypted Channel (T1573)</p> </td> <td> <p>DNSTT and many tunnel apps encrypt payloads inside DNS to prevent content inspection.</p> </td> </tr> <tr> <td> <p>Command and Control</p> </td> <td> <p>Proxy (T1090)</p> </td> <td> <p>Tunneling apps act as unauthorized proxies to external infrastructure.</p> </td> </tr> <tr> <td> <p>Exfiltration</p> </td> <td> <p>Exfiltration Over C2 Channel (T1041)</p> </td> <td> <p>Data can be moved out over the same DNS tunnel used for control.</p> </td> </tr> <tr> <td> <p>Exfiltration</p> </td> <td> <p>Exfiltration Over Alternative Protocol (T1048)</p> </td> <td> <p>DNS is used as an alternative protocol to move data when other traffic is blocked.</p> </td> </tr> <tr> <td> <p>Defense Evasion</p> </td> <td> <p>Obfuscated/Compressed Data (T1027) and Data Obfuscation (T1001)</p> </td> <td> <p>Payloads are encoded in subdomain labels or TXT records to evade simple detection.</p> </td> </tr> <tr> <td> <p>Discovery and Resource Development</p> </td> <td> <p>Domain and DNS Infrastructure are repurposed for covert transport</p> </td> <td> <p>Use of custom authoritative DNS and dynamic subdomains supports the tunnel channel.</p> </td> </tr> </tbody> </table> <p>&nbsp;</p> <br> <p>&nbsp;</p></span>